Sciweavers

824 search results - page 129 / 165
» Law-Governed Internet Communities
Sort
View
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
14 years 2 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu
BROADNETS
2007
IEEE
14 years 2 months ago
Modeling and generating TCP application workloads
Abstract — In order to perform valid experiments, traffic generators used in network simulators and testbeds require up to date models of traffic as it exists on real network lin...
Félix Hernández-Campos, Kevin Jeffay...
CISIS
2007
IEEE
14 years 2 months ago
Obtaining Performance Measures through Microbenchmarking in a Peer-to-Peer Overlay Computer
: The availability of enormous amounts of un-used computing power and data storage over the In-ternet makes the development of a globally distributed computing platform, called Ove...
Paolo Bertasi, Mauro Bianco, Andrea Pietracaprina,...
IPCCC
2007
IEEE
14 years 2 months ago
Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture
— Recently, there has been increased interest, shown by the research community and by industry fora, to enable emergency services for voice-over-IP based architectures. In order ...
Hannes Tschofenig, Henning Schulzrinne, Murugaraj ...
SEMCO
2007
IEEE
14 years 2 months ago
Lexical and Discourse Analysis of Online Chat Dialog
One of the ultimate goals of natural language processing (NLP) systems is understanding the meaning of what is being transmitted, irrespective of the medium (e.g., written versus ...
Eric N. Forsythand, Craig H. Martell